Computer insecurity

Results: 197



#Item
181A WHITE PAPER  Risking It All: Unlocking the Backdoor to the Nation’s Cybersecurity

A WHITE PAPER Risking It All: Unlocking the Backdoor to the Nation’s Cybersecurity

Add to Reading List

Source URL: www.ieeeusa.org

Language: English - Date: 2014-06-25 11:21:15
182Executive Summary  2 Executive Summary INFORMATION SECURITY BREACHES SURVEY 2014 | technical report

Executive Summary 2 Executive Summary INFORMATION SECURITY BREACHES SURVEY 2014 | technical report

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2014-04-29 12:04:18
183Operation Saffron Rose  Authors: Nart Villeneuve, Ned Moran, Thoufique Haq and Mike Scott

Operation Saffron Rose Authors: Nart Villeneuve, Ned Moran, Thoufique Haq and Mike Scott

Add to Reading List

Source URL: www.fireeye.com

Language: English - Date: 2014-05-13 07:46:39
184INFORMATION SySTEMS, WEB AND PERVASIVE COMPUTING Coordinator Scientific Committee  Jean-Charles Pomerol, University Pierre and Marie Curie and INSIS/CNRS, Paris, France

INFORMATION SySTEMS, WEB AND PERVASIVE COMPUTING Coordinator Scientific Committee Jean-Charles Pomerol, University Pierre and Marie Curie and INSIS/CNRS, Paris, France

Add to Reading List

Source URL: www.iste.co.uk

Language: English - Date: 2014-05-07 10:56:54
185IQT QUARTERLY  SOFTWARE INSECURITY By Rik Farrow  While awareness of software security principles has improved tremendously over

IQT QUARTERLY SOFTWARE INSECURITY By Rik Farrow While awareness of software security principles has improved tremendously over

Add to Reading List

Source URL: rikfarrow.com

Language: English - Date: 2010-11-19 16:21:21
186Economics, Psychology, and Sociology of Security Andrew Odlyzko Digital Technology Center, University of Minnesota, 499 Walter Library, 117 Pleasant St. SE, Minneapolis, MN 55455, USA

Economics, Psychology, and Sociology of Security Andrew Odlyzko Digital Technology Center, University of Minnesota, 499 Walter Library, 117 Pleasant St. SE, Minneapolis, MN 55455, USA

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2003-04-21 08:11:22
187Counter Stealth Malware Solution Guide

Counter Stealth Malware Solution Guide

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:32
188CYBER-ATTACKS Cyber-Terrorism Tactics… and How They Could Affect You  Safety & Security Remain

CYBER-ATTACKS Cyber-Terrorism Tactics… and How They Could Affect You Safety & Security Remain

Add to Reading List

Source URL: www.nmbonline.com

Language: English - Date: 2013-06-26 14:34:56
189White Paper  Dissecting Operation Troy:

White Paper Dissecting Operation Troy:

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:07:59
190Predators everywhere look for an opportunity to take advantage of innocent people at any given moment. Computers, in conjunction with the Internet, have given some of these predators a

Predators everywhere look for an opportunity to take advantage of innocent people at any given moment. Computers, in conjunction with the Internet, have given some of these predators a

Add to Reading List

Source URL: www.phillipdixon.net

Language: English - Date: 2013-10-03 14:54:41